Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 12 |
Descriptor
Source
| ProQuest LLC | 7 |
| Education and Information… | 1 |
| IEEE Transactions on Learning… | 1 |
| Information Systems Education… | 1 |
| Journal of Cybersecurity… | 1 |
| Online Submission | 1 |
Author
| Bell, Zerla | 1 |
| Bernard Ngalim | 1 |
| Caramancion, Kevin Matthe | 1 |
| Childs, Dawn | 1 |
| Christopher D. Adams | 1 |
| Chu, Xiaoyan | 1 |
| Emeka Ejikeme | 1 |
| James Johnston | 1 |
| Ladwig, Christine | 1 |
| Mohammad Ghulam Ali | 1 |
| Prior, Suzanne | 1 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 7 |
| Journal Articles | 4 |
| Reports - Descriptive | 2 |
| Information Analyses | 1 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 6 |
| Postsecondary Education | 6 |
| Adult Education | 1 |
| Elementary Education | 1 |
Audience
Location
| Cameroon | 2 |
| Texas | 1 |
| United Kingdom (Scotland) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mohammad Ghulam Ali – Online Submission, 2025
As higher education institutions (HEIs) increasingly rely on digital technologies for teaching, research, and administration, they are facing continuous increases in cybersecurity threats due to their open and complex IT environments. They are becoming high-value targets for cyberattacks such as ransomware, data breaches, and intellectual property…
Descriptors: Computer Security, Governance, Educational Policy, Policy Formation
Caramancion, Kevin Matthe – ProQuest LLC, 2022
Misinformation and Disinformation, both types of Information Disorder in the cyber world, operate on a systemic level. Several factors enabling their persistence, including laws, policies, and technological mediators, have been investigated in the literature. Cybersecurity frameworks and guidelines specify that the target victims, as part of the…
Descriptors: Interdisciplinary Approach, Information Literacy, Consciousness Raising, Computer Security
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices
Emeka Ejikeme – ProQuest LLC, 2023
The U.S. National Institute of Standards and Technology (NIST) identified that approximately 1.8 million cybersecurity positions were vacant in 2021 because of a lack of professionals with the required skill sets and who remained in their jobs long enough to contribute to their organizations' cybersecurity needs. Also shown was the rising global…
Descriptors: Best Practices, Computer Security, College Graduates, Computer Literacy
Childs, Dawn – ProQuest LLC, 2023
Cyberattacks in the United States have consistently increased over recent years, and there is no apparent end to this upward trend. The increase in these attacks has resulted in successful cyber incidents and breaches of large, small, and medium-sized organizations across varied locales and industries. The hospitality industry has not been immune…
Descriptors: Hospitality Occupations, Professional Education, Curriculum, Computer Security
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Prior, Suzanne; Renaud, Karen – Education and Information Technologies, 2022
Online users require a working knowledge of password "best practice", as well as the ability to apply such knowledge. Children increasingly operate as independent agents online, and thus also need to be aware of password "best practice". To meet this need, the Scottish curriculum for excellence includes lessons about password…
Descriptors: Foreign Countries, Elementary School Students, Low Income Students, Economically Disadvantaged
James Johnston – ProQuest LLC, 2024
The need in the public sector is to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction, as this group is targeted more than others for technology fraud. The practice-focused question centers around which topics need to be part of technology fraud pilot training to reduce the…
Descriptors: Older Adults, Learning Theories, Information Security, Pilot Projects
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2022
As the twenty-first century advances technologically, the era is also becoming notorious for the rise of organized cybercrime and attacks on business information and operations. Company data and intellectual property are considered the "New Oil" that generates value for organizations and their constituents. With the escalating number of…
Descriptors: Computer Security, Crime, Insurance, Intellectual Property
Wang, Minjuan; Yu, Haiyang; Bell, Zerla; Chu, Xiaoyan – IEEE Transactions on Learning Technologies, 2022
The Metaverse is a network of 3-D virtual worlds supporting social connections among its users and enabling them to participate in activities mimicking real life. It merges physical and virtual reality and provides channels for multisensory interactions and immersions in a variety of environments (Mystakidis, 2022). The Metaverse is considered the…
Descriptors: Technology Uses in Education, Computer Simulation, Educational Environment, Best Practices
Christopher D. Adams – ProQuest LLC, 2023
Modern higher education institutions must contend with a litany of cyber threats, regulations, and environmental dynamics. These institutions are increasingly being targeted due to the value of the data they possess and their historically permissive configurations that are intended to support academic freedom. Many universities are implementing…
Descriptors: Information Security, Computer Security, Academic Freedom, Corporate Education

Direct link
Peer reviewed
